Sciweavers

TDP
2008
160views more  TDP 2008»
13 years 4 months ago
Enhanced P-Sensitive K-Anonymity Models for Privacy Preserving Data Publishing
Publishing data for analysis from a micro data table containing sensitive attributes, while maintaining individual privacy, is a problem of increasing significance today. The k-ano...
Xiaoxun Sun, Hua Wang, Jiuyong Li, Traian Marius T...
TDP
2008
96views more  TDP 2008»
13 years 4 months ago
Constrained Microaggregation: Adding Constraints for Data Editing
Privacy preserving data mining and statistical disclosure control have introduced several methods for data perturbation that can be used for ensuring the privacy of data respondent...
Vicenç Torra
TDP
2008
92views more  TDP 2008»
13 years 4 months ago
Data Access in a Cyber World: Making Use of Cyberinfrastructure
The vast amount of data now collected on human beings and organizations as a result of cyberinfrastructure advances has created similarly vast opportunities for social sc...
Julia Lane, Pascal Heus, Tim Mulcahy
TDP
2008
111views more  TDP 2008»
13 years 4 months ago
Statistical Disclosure Control for Microdata Using the R-Package sdcMicro
The demand for high quality microdata for analytical purposes has grown rapidly among researchers and the public over the last few years. In order to respect existing laws on data ...
Matthias Templ
TDP
2008
67views more  TDP 2008»
13 years 4 months ago
Generating Sufficiency-based Non-Synthetic Perturbed Data
The mean vector and covariance matrix are sufficient statistics when the un derlying distribution is multivariate normal. Many type of statistical analyses used in practice rely on...
Krishnamurty Muralidhar, Rathindra Sarathy
TDP
2008
60views more  TDP 2008»
13 years 4 months ago
On Overlappings of Digitized Straight Lines and Shared Steganographic File Systems
We consider the unbounded integer grid and the digitized version of the straight line y = x + , with , R being the set of points (i, [i + ]), i Z, where [
Maria Bras-Amorós, Josep Domingo-Ferrer